Article Details
Scrape Timestamp (UTC): 2025-05-28 18:15:00.508
Original Article Text
Click to Toggle View
Interlock ransomware gang deploys new NodeSnake RAT on universities. The Interlock ransomware gang is deploying a previously undocumented remote access trojan (RAT) named NodeSnake against educational institutes for persistent access to corporate networks. QuorumCyber researchers report seeing NodeSnake's deployment in at least two cases targeting universities in the UK in January and March 2025. The two malware samples significantly differ, indicating active development to add new features and capabilities on NodeSnake. As first reported by BleepingComputer, Interlock is a ransomware group launched in September 2024. It has previously targeted the Texas Tech University, the DaVita kidney dialysis firm, and the Kettering Health medical network in Ohio. The threat group has also been seen leveraging 'ClickFix' attacks that impersonate IT tools to achieve initial infection and network infiltration. The new NodeSnake RAT malware Interlock's latest attacks on educational institutions start with phishing emails carrying malicious links or attachments that lead to NodeSnake RAT infections. The JavaScript malware, which is executed with NodeJS, establishes persistence upon infection by using PowerShell or CMD scripts to write a deceptive Registry entry named 'ChromeUpdater' to impersonate Google Chrome's updater. For evasion, the malware runs as a detached background process, filenames and payloads are assigned random names, and command-and-control (C2) addresses are cycled through with randomized delays. Moreover, the malware features heavy code obfuscation, XOR encryption with a rolling key and random seeds, and performs console tampering to disrupt normal debug output. Although the C2 IP address is hardcoded, the connection is routed through Cloudflare-proxied domains for obfuscation. Once active on the infected machine, it collects key metadata about the user, running processes, services, and network configurations and exfiltrates it to the C2. The malware can kill active processes or load additional EXE, DLL, or JavaScript payloads on the device. The newer NodeSnake variant can also execute CMD commands and use additional modules to change C2 polling behavior dynamically. The command results are bundled in the exfiltrated data packs, allowing real-time shell interaction. The existence of NodeSnake and its continuous development is an indication of Interlock's continued evolution and focus on long-term stealthy persistence. The complete list of the indicators of compromise for this threat is available at the bottom of the QuorumCyber report. Monitoring for these could help block ransomware attacks early on before Interlock proceeds to the data exfiltration and encryption phase. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
The Interlock ransomware gang has introduced a new remote access trojan, NodeSnake, aimed at infiltrating educational institutions.
Researchers at QuorumCyber identified NodeSnake in at least two incidents involving UK universities in early 2025, with evidence of ongoing development to enhance its functionalities.
Initial infection vectors include phishing emails with malicious attachments or links leading to the deployment of the NodeSnake RAT.
NodeSnake utilizes sophisticated evasion techniques such as heavy code obfuscation, XOR encryption, and uses PowerShell or CMD scripts to mimic legitimate software updates.
Once installed, NodeSnake gathers critical system information and can execute additional malicious activities, including process termination and loading further malware.
The trojan modifies its command and control communication dynamically, complicating detection and mitigation efforts.
The report by QuorumCyber details the indicators of compromise for NodeSnake, providing essential information for early detection and prevention of further attacks by the Interlock group.
The discovery underscores Interlock's strategic shift towards sustained, stealthy operations within target networks, particularly in the education sector.